06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A.5 Just-Fast-Keying (JFK) Protocol<br />

The SP will decrypt the message and a successful decryption provides the key authentication.<br />

It then veries the signature and process the transaction.<br />

A.5 Just-Fast-Keying (JFK) Protocol<br />

Aiello et al. [178] proposed two variants of JFK protocol, with dierence based on who<br />

initiate the protocol. In this thesis, we refer to JFKi that provides identity protection<br />

<strong>for</strong> initiator (e.g. smart card) even against active attacks. In the JFKi, the smart card<br />

initiates the session that is described below:<br />

JFKi-1. SC → SP : h(N SC )||g SC ||ID S ′<br />

The initiator (SC) generates a random number (N SC ) and sends its hash along with Die-<br />

Hellman exponential (g SC ) appended with requirement of the SC about authentication<br />

in<strong>for</strong>mation that the SP should use in subsequently messages. The requirement of the SC<br />

is indicated by ID S ′<br />

JFKi-2. SP : S SP = Sign SP (g SP ||grpinfo R )<br />

SP : SID = f mkSP (g SP ||N SP ||h(N SC )||IP SC )<br />

SP → SC : h(N SC )||N SP ||g SP ||grpinfo R ||ID SP ||S SP ||SID<br />

In response, the SP also generates a random number and Die-Hellman exponentials. The<br />

SP then sends the h(N SC ) along with the grpinfo R and ID SP . The grpinfo R indicates<br />

to the SC the set of Die-Hellman groups supported by the SP. The ID SP provides the<br />

authentication in<strong>for</strong>mation of SP that was request by the SC in message one. Furthermore,<br />

the SP generates a signature on the generated g SP and grpinfo R , and nally append the<br />

session identier (SID) to safeguard against possible DoS attacks.<br />

JFKi-3. SC : K = (g SP ) SC<br />

SC : k US = f K (h(N SC )||N SP || ′′ 1 ′′ )<br />

SC : mk US = f K (h(N SC )||N SP || ′′ 2 ′′ )<br />

SC : mE = e kUS (U i ||Sign SC (h(N SC )||N R ||g SC ||g SP ||S i ))<br />

SC → SP : N SC ||N SP ||g SC ||g SP ||mE||f mkSC−SP (mE)||SID<br />

The SC generates the session encryption and MAC keys from the shared secret (K). The SC<br />

then generates a message including identities of communicating entities, random numbers<br />

generated during the session, and Die-Hellman exponentials. The SC then signs this<br />

message and later encrypts it. The encrypted message is then MACed and sent to the SP.<br />

JFKi-4. SP : mE = e kUS (Sign SP (h(N SC )||N R ||g SC ||g SP ||U i ))<br />

SP → SC : mE||f mkSC−SP (mE)<br />

In response the SP generates a signature that includes random numbers, Die-Hellman<br />

exponentials and identity of the SC. The signed message is then encrypted and MACed<br />

be<strong>for</strong>e sending it to the SC.<br />

235

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!